Sophocles is noted as saying that it is better to fail with honor than to succeed by fraud. Unfortunately, for Apple this philosophy isn’t shared by criminals within the Apple Payment System. Relaxed authentication practices used by the banking institutions have led to fraud issues with the Apple Payment System. New exploits linked to Apple […]
Words of Wisdom: The Worst Passwords of 2014
American Author Clifford Stoll has argued that the best quote whilst teaching others the importance of proper password safety is: “Treat your password like your toothbrush. Don’t let anybody else use it, and get a new one every six months.” This quote is perhaps the best way to teach your children proper password procedures, along […]
6 Exciting Updates From 2014
2014 was the year of security breaches with companies one after another who were becoming victims to hackers and data breaches. The climate for 2015 looks to be the aftermath with everyone wondering what can be done to prevent such things in the future. In 2014, Hypersocket took these incidents and focused upon ensuring […]
What is the Danger of BYO Device Policies?
How to Protect your Network from Personal Devices The “consumerisation’ of business technology is picking-up speed. This trend towards the introduction of consumer technology within the corporate environment for the use of work activities is best reflected in policies like Bring Your Own Device (BYOD). These policies have become prevalent in most corporate environments, and […]
The Virtues of Virtual Private Networks (VPNs)
The Virtues of Virtual Private Networks Cloud computing is here to stay, and the buzz throughout industry and government is that hybrid clouds will become the new norm going forward. Hybrid clouds, according to industry experts, can offer the security of on premise, private clouds and the flexibility and agility of commercial public clouds. The […]